SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Communicating over the
Network

Network Fundamentals – Chapter 2

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Identify the structure of a network, including the
devices and media that are necessary for successful
communications.



Identify the function of protocols in network
communications.



Identify the advantages of using a layered model to
describe network functionality.



Identify the role of each layer in two recognized
network models: The TCP/IP model and the OSI
model.



Identify the importance of addressing and naming
schemes in network communications.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Network Structure
 Elements of communication

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Network Structure
 How messages are communicated

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Network Structure
 Components of a network

ITE 1 Chapter 6

Software: Network applications i.e. Web
Server(http), File Transfer (FTP), Internet
Relay chat (IRC), Domain Name Translation
(DNS), Email (SMTP)

Hardware: Laptop, PC , NIC, Repeater, Hub
switch, modem, Wireless routers
Communications servers, Routers, cables,
Free space

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Network Structure
 End Devices and their Role in the Network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Network Structure
Intermediary devices connect the individual hosts to the network and can
connect multiple individual networks to form an internetwork.
Examples:
 Network Access Devices (Hubs, switches, and wireless access points)
 Internetworking Devices (routers)
 Communication Servers and Modems
 Security Devices (firewalls)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Network Types
 Local Area Networks (LANs)

Topologies include:
•Star
•Mesh
•Ring

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Network Types
 Wide Area Networks (WANs)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Network Types
 Internet

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Network Types
 Network Icons

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Function of Protocol in Network
Communication
 Protocols and layered models facilitate communication
over data networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Function of Protocol in Network
Communication
 Network protocols

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Function of Protocol in Network
Communication
 Different protocols interact between layers

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Function of Protocol in Network
Communication
 Protocols allow Technology independence

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
Layers with TCP/IP and OSI Model
 Layered models facilitate complex design from multiple
vendors

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Layers with TCP/IP and OSI Model
 TCP/IP Model (Working model of the Internet)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Layers with TCP/IP and OSI Model
 Communication Process is through each layer

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Layers with TCP/IP and OSI Model
 Protocol data units (PDU) and encapsulation

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Layers with TCP/IP and OSI Model
 Process of sending and receiving messages

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
Layers with TCP/IP and OSI Model
 Protocol and reference models

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21
Layers with TCP/IP and OSI Model
 OSI Model Layers

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22
Layers with TCP/IP and OSI Model
 Comparison of OSI and TCP/IP model

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23
Addressing and Naming Schemes
 Encapsulation headers are used to manage
communication in data networks

•Allows data to move between end
devices using MAC addressing and IP
addressing
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24
Addressing and Naming Schemes
 Getting the Data to the end Device on Data-Link Layer

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25
Addressing and Naming Schemes
 Getting the Data through the Internetwork

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26
Addressing and Naming Schemes
 Port numbers are used to identify the destination
application
FTP (21),SSH(22),Telnet(23),
Email(25), http(80)
www(8080) IRC(6667)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27
IP addressing Basics

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28
IP addressing Basics

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

29
IP addressing Basics

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

30
IP addressing Basics

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

31
Example
 Example: For the address 192.168.1.3
 Determine:

 The length of the subnet mask in bits.
 The Subnet mask format in dotted decimal format
 The class of the address
 The number of bits in the host portion
 The network address

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

32
Solution

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

33
Solutions
 The length of the subnet mask in bits. (24)
 The Subnet mask format in dotted decimal format
(255.255.255.0)
 The class of the address (C)
 The number of bits in the host portion (8 bits)
 The network address (192.168.1.0 i.e. when all the
host bits are 0)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

34
Network Models and Protocols
 2.6.2 Using Wireshark to vew PDUs
 3.4.2 Managing a small web server
(Applications, Addressing, Protocols, connectivity)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

35

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
network design and administration
network design and administrationnetwork design and administration
network design and administrationerick chuwa
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Network cable
Network cableNetwork cable
Network cableOnline
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 

Was ist angesagt? (20)

CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
network design and administration
network design and administrationnetwork design and administration
network design and administration
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Instalasi kabel UTP untuk jaringan komputer
Instalasi kabel UTP untuk jaringan komputerInstalasi kabel UTP untuk jaringan komputer
Instalasi kabel UTP untuk jaringan komputer
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Network cable
Network cableNetwork cable
Network cable
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 

Andere mochten auch

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2Sachii Dosti
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ipmyl_1116
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Deterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicDeterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicLeyo Stephen
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyBhagya Shree
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần tanqn_hut
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estadovanessavergara18
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)Bizapity
 
Tips for throwing a DIY Birthday party
Tips for throwing a  DIY Birthday partyTips for throwing a  DIY Birthday party
Tips for throwing a DIY Birthday partyY'ems GroupCo
 
Auto con piloto automatico
Auto con piloto automaticoAuto con piloto automatico
Auto con piloto automaticosonia_mq
 
Social Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian ExperienceSocial Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian ExperienceAnita Breuer
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenesvanessavergara18
 

Andere mochten auch (20)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Chapter2
Chapter2Chapter2
Chapter2
 
Deterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicDeterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministic
 
Acropolis griegas
Acropolis griegasAcropolis griegas
Acropolis griegas
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estado
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Ethernet
EthernetEthernet
Ethernet
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)
 
Tips for throwing a DIY Birthday party
Tips for throwing a  DIY Birthday partyTips for throwing a  DIY Birthday party
Tips for throwing a DIY Birthday party
 
Auto con piloto automatico
Auto con piloto automaticoAuto con piloto automatico
Auto con piloto automatico
 
Social Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian ExperienceSocial Media and (Urban) Social Protest: The Brazilian Experience
Social Media and (Urban) Social Protest: The Brazilian Experience
 
Presentation1
Presentation1Presentation1
Presentation1
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenes
 

Ähnlich wie Network Fundamentals – Chapter 2

Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network accessteknetir
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network AccessYaser Rahmati
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptssuser7c54e61
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 

Ähnlich wie Network Fundamentals – Chapter 2 (20)

Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
Chapter 4 : Network access
Chapter 4 : Network accessChapter 4 : Network access
Chapter 4 : Network access
 
Chapter 04 - Network Access
Chapter 04 - Network AccessChapter 04 - Network Access
Chapter 04 - Network Access
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 

Mehr von Sachii Dosti

Network technology paper
Network technology paperNetwork technology paper
Network technology paperSachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpgSachii Dosti
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical LayerSachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 

Mehr von Sachii Dosti (11)

Network technology paper
Network technology paperNetwork technology paper
Network technology paper
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
ip v6
ip v6ip v6
ip v6
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 

Kürzlich hochgeladen

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Kürzlich hochgeladen (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Network Fundamentals – Chapter 2

  • 1. Communicating over the Network Network Fundamentals – Chapter 2 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify the structure of a network, including the devices and media that are necessary for successful communications.  Identify the function of protocols in network communications.  Identify the advantages of using a layered model to describe network functionality.  Identify the role of each layer in two recognized network models: The TCP/IP model and the OSI model.  Identify the importance of addressing and naming schemes in network communications. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Network Structure  Elements of communication ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Network Structure  How messages are communicated ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Network Structure  Components of a network ITE 1 Chapter 6 Software: Network applications i.e. Web Server(http), File Transfer (FTP), Internet Relay chat (IRC), Domain Name Translation (DNS), Email (SMTP) Hardware: Laptop, PC , NIC, Repeater, Hub switch, modem, Wireless routers Communications servers, Routers, cables, Free space © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Network Structure  End Devices and their Role in the Network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Network Structure Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Examples:  Network Access Devices (Hubs, switches, and wireless access points)  Internetworking Devices (routers)  Communication Servers and Modems  Security Devices (firewalls) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Network Types  Local Area Networks (LANs) Topologies include: •Star •Mesh •Ring ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Network Types  Wide Area Networks (WANs) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Network Types  Internet ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Network Types  Network Icons ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Function of Protocol in Network Communication  Protocols and layered models facilitate communication over data networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Function of Protocol in Network Communication  Network protocols ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Function of Protocol in Network Communication  Different protocols interact between layers ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Function of Protocol in Network Communication  Protocols allow Technology independence ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Layers with TCP/IP and OSI Model  Layered models facilitate complex design from multiple vendors ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Layers with TCP/IP and OSI Model  TCP/IP Model (Working model of the Internet) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Layers with TCP/IP and OSI Model  Communication Process is through each layer ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Layers with TCP/IP and OSI Model  Protocol data units (PDU) and encapsulation ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Layers with TCP/IP and OSI Model  Process of sending and receiving messages ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Layers with TCP/IP and OSI Model  Protocol and reference models ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Layers with TCP/IP and OSI Model  OSI Model Layers ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Layers with TCP/IP and OSI Model  Comparison of OSI and TCP/IP model ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. Addressing and Naming Schemes  Encapsulation headers are used to manage communication in data networks •Allows data to move between end devices using MAC addressing and IP addressing ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Addressing and Naming Schemes  Getting the Data to the end Device on Data-Link Layer ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Addressing and Naming Schemes  Getting the Data through the Internetwork ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Addressing and Naming Schemes  Port numbers are used to identify the destination application FTP (21),SSH(22),Telnet(23), Email(25), http(80) www(8080) IRC(6667) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. IP addressing Basics ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  • 29. IP addressing Basics ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. IP addressing Basics ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
  • 31. IP addressing Basics ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
  • 32. Example  Example: For the address 192.168.1.3  Determine:   The length of the subnet mask in bits.  The Subnet mask format in dotted decimal format  The class of the address  The number of bits in the host portion  The network address ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
  • 33. Solution ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
  • 34. Solutions  The length of the subnet mask in bits. (24)  The Subnet mask format in dotted decimal format (255.255.255.0)  The class of the address (C)  The number of bits in the host portion (8 bits)  The network address (192.168.1.0 i.e. when all the host bits are 0) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34
  • 35. Network Models and Protocols  2.6.2 Using Wireshark to vew PDUs  3.4.2 Managing a small web server (Applications, Addressing, Protocols, connectivity) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 35

Hinweis der Redaktion

  1. Consider, for example, the desire to communicate using words, pictures, and sounds. Each of these messages can be sent across a data or information network by first converting them into binary digits, or bits. These bits are then encoded into a signal that can be transmitted over the appropriate medium. In computer networks, the media is usually a type of cable, or a wireless transmission.
  2. A better approach is to divide the data into smaller, more manageable pieces to send over the network. This division of the data stream into smaller pieces is called segmentation. Segmenting messages has two primary benefits. First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process used to interleave the pieces of separate conversations together on the network is called multiplexing. Second, segmentation can increase the reliability of network communications. The separate pieces of each message need not travel the same pathway across the network from source to destination. If a particular path becomes congested with data traffic or fails, individual pieces of the message can still be directed to the destination using alternate pathways. If part of the message fails to make it to the destination, only the missing parts need to be retransmitted.
  3. Devices and media are the physical elements or hardware of the network. Hardware is often the visible components of the network platform such as a laptop, a PC, a switch, or the cabling used to connect the devices. Services and processes are the communication programs, called software, that run on the networked devices. A network service provides information in response to a request. Services include many of the common network applications people use every day, like e-mail hosting services and web hosting services.
  4. The network devices that people are most familiar with are called end devices. These devices form the interface between the human network and the underlying communication network. Some examples of end devices are: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Mobile handheld devices (such as wireless barcode scanners, PDAs)
  5. In addition to the end devices that people are familiar with, networks rely on intermediary devices to provide connectivity and to work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Examples of intermediary network devices are: Network Access Devices (Hubs, switches, and wireless access points) Internetworking Devices (routers) Communication Servers and Modems Security Devices (firewalls) Processes running on the intermediary network devices perform these functions: Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings
  6. Networks infrastructures can vary greatly in terms of: The size of the area covered The number of users connected The number and types of services available An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region. This type of network is called a Local Area Network (LAN). A LAN is usually administered by a single organization. The administrative control that governs the security and access control policies are enforced on the network level.
  7. When a company or organization has locations that are separated by large geographical distances, it may be necessary to use a telecommunications service provider (TSP) to interconnect the LANs at the different locations. Individual organizations usually lease connections through a telecommunications service provider network. These networks that connect LANs in geographically separated locations are referred to as Wide Area Networks (WANs). Although the organization maintains all of the policies and administration of the LANs at both ends of the connection, the policies within the communications service provider network are controlled by the TSP.
  8. The Internet is created by the interconnection of networks belonging to Internet Service Providers (ISPs). These ISP networks connect to each other to provide access for millions of users all over the world. Ensuring effective communication across this diverse infrastructure requires the application of consistent and commonly recognized technologies and protocols as well as the cooperation of many network administration agencies.
  9. For example, consider two people communicating face-to-face. As the figure shows, we can use three layers to describe this activity. At the bottom layer, the physical layer, we have two people, each with a voice that can utter words aloud. At the second layer, the rules layer, we have an agreement to speak in a common language. At the top layer, the content layer, we have the words actually spoken-the content of the communication. Were we to witness this conversation, we would not actually see "layers" floating in space. It is important to understand that the use of layers is a model and, as such, it provides a way to conveniently break a complex task into parts and describe how they work.
  10. An example of the use of a protocol suite in network communications is the interaction between a web server and a web browser. This interaction uses a number of protocols and standards in the process of exchanging information between them. The different protocols work together to ensure that the messages are received and understood by both parties. Examples of these protocols are: Hypertext Transfer Protocol (HTTP) is a common protocol that governs the way that a web server and a web client interact. HTTP defines the content and formatting of the requests and responses exchanged between the client and server. Transmission Control Protocol (TCP) is the transport protocol that manages the individual conversations between web servers and web clients. TCP divides the HTTP messages into smaller pieces, called segments, to be sent to the destination client. It is also responsible for controlling the size and rate at which messages are exchanged between the server and the client. The most common internetwork protocol is Internet Protocol (IP). IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses, and selecting the best path to the destination host. Data-link management protocols take the packets from IP and format them to be transmitted over the media. The standards and protocols for the physical media govern how the signals are sent over the media and how they are interpreted by the receiving clients.
  11. There are benefits to using a layered model to describe network protocols and operations. Using a layered model: Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together. Prevents technology or capability changes in one layer from affecting other layers above and below. Provides a common language to describe networking functions and capabilities.
  12. The first layered protocol model for internetwork communications was created in the early 1970s and is referred to as the Internet model. It defines four categories of functions that must occur for communications to be successful. The architecture of the TCP/IP protocol suite follows the structure of this model. Because of this, the Internet model is commonly referred to as the TCP/IP model.
  13. A complete communication process includes these steps: 1. Creation of data at the application layer of the originating source end device 2. Segmentation and encapsulation of data as it passes down the protocol stack in the source end device 3. Generation of the data onto the media at the network access layer of the stack 4. Transportation of the data through the internetwork, which consists of media and any intermediary devices 5. Reception of the data at the network access layer of the destination end device 6. Decapsulation and reassembly of the data as it passes up the stack in the destination device 7. Passing this data to the destination application at the Application layer of the destination end device
  14. As application data is passed down the protocol stack on its way to be transmitted across the network media, various protocols add information to it at each level. This is commonly known as the encapsulation process.
  15. Allows data to move between end devices using MAC addressing and IP addressing
  16. At the boundary of each local network, an intermediary network device, usually a router, decapsulates the frame to read the destination host address contained in the header of the packet, the Layer 3 PDU. Routers use the network identifier portion of this address to determine which path to use to reach the destination host. Once the path is determined, the router encapsulates the packet in a new frame and sends it on its way toward the destination end device. When the frame reaches its final destination, the frame and packet headers are removed and the data moved up to Layer 4.
  17. Think about a computer that has only one network interface on it. All the data streams created by the applications that are running on the PC enter and leave through that one interface, yet instant messages do not popup in the middle of word processor document or e-mail showing up in a game. This is because the individual processes running on the source and destination hosts communicate with each other. Each application or service is represented at Layer 4 by a port number. A unique dialogue between devices is identified with a pair of Layer 4 source and destination port numbers that are representative of the two communicating applications. When the data is received at the host, the port number is examined to determine which application or process is the correct destination for the data.